The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Hardware information security has become an important structure and application metric. The existing hardware security has a well designed security measures but it only address a certain amount of rising security requirements and is slow for a lot of the emerging security primitives Physical true random number generators (TRNGs) appear to be critical components of many cryptographic systems. Random...
The memristor, short for memory resistor, is the fourth fundamental passive circuit element, whereby it can remember the resistance based on the last applied voltage. The memristor is used in the Physically Unclonable Function (PUF), which has potential for hardware security. To improve the performance of the memristor-based arbiter PUF, two modifications were made on the design, which are extracting...
The memristor is the fourth fundamental passive circuit element, whereas the Physically Unclonable Function (PUF) is a relatively new hardware-based security primitive. PUFs are unclonable due to manufacturing process variations Thus, PUFs are said to have a fingerprint that is unique to each PUF which can be used for security purposes. In this paper, the memristor is applied into a PUF, where a CMOS-memristor...
Maintaining the security of communication is very crucial nowadays. It is important in cryptographic security to have strong keys and is secretive. Random number generators are used to combat this problem by producing different and unique identification for each user in a network. Memristors has been studied as a potential tool in hardware security because of its energy efficiency and the nanotechnology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.